What's the Tea in L&E? Employee Devices: What is #NSFW?
Hybrid Workforces and Compliance with Sheila Limmroth
Sitting with the C-Suite: How Do Corporations Manage the Convergence of Data during Remote Work?
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
The purpose of this paper is to show how the failure to monitor for and prevent off-channel communications poses risk to traditional depository institutions that are not subject to the jurisdiction of securities-law...more
While smart toys can certainly be useful educational tools for children, they also present some potential privacy risks and could invade what is traditionally a private space. Think about it—the thought of your child’s toy...more
Mandi Ross, the CEO of both Prism Litigation Technology and Insight Optix, has about 35 years of experience in the eDiscovery space. She started as a paralegal, and has worked as an expert and consultant. She previously...more
If your organization embraces (or simply allows!) the use of mobile devices for the workplace, the natural tradeoff you’re making for increased productivity, efficiency and convenience is an increase in cybersecurity risks to...more
Pokémon Go has taken the United States and the rest of the world by storm, with an estimated 75 million downloads in the first three weeks since its release. For the uninitiated, Pokémon Go is an augmented reality game where...more
It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more
The National Institute of Standards and Technology (NIST) cybersecurity center released a draft guide last week for health IT professionals to use to bolster security for the use of mobile devices in the health care industry....more